Modern data exchange between systems: Why iPaaS is the future
In a world where systems need to be ever more closely linked, it is no longer enough to view standards such as SCIM as a universal solution for exchanging identity and user data.
Read moreGoing Deeper: Agentic AI Security
Why most AI architectures today are insecure and how an identity-first approach can solve the problem in the context of ...
Who actually makes decisions about Keycloak? – Open Source SSO
Keycloak is one of the best-known open-source projects in the field of Identity & Access Management - and at the ...
Digital sovereignty through open source: cure-all or fallacy?
Open source has become an integral part of modern software development. No application, platform, or cloud architecture today can function ...
Open Policy Agent (OPA) – Flexible authorization for modern applications
Modern applications require more than simple role models. Microservices, cloud deployments, and distributed systems create new challenges for organizations in ...
Policy-based access control PBAC – Dynamic access control for modern companies
Policy-based access control (PBAC) describes a modern approach to access control in which access rights are no longer assigned exclusively ...
Automating identity provisioning for SAP S/4HANA with cidaas
Identity provisioning for user accounts in enterprise systems such as SAP S/4HANA has long been a complex, highly customized process ...
Federated Identity Management
As organizations move deeper into SAP’s cloud ecosystem, especially the SAP Business Technology Platform (BTP), federated identity becomes a foundational ...
Goodbye, SAP IDM: End of life. Time to rethink Identities
How SAP’s IDM End of Life decision opens the door for leaner, modern IAM landscape ...
The new DORA EU Regulation comes into force: What companies need to do now!
The DORA EU Regulation raises digital resilience in the financial sector to a uniform EU level ...
IAM made in Europe: Digital Sovereignty Starts with Bold Platforms
IAM made in Europe is more than a trend – it’s the foundation of digital sovereignty. Discover why European platforms ...
11 Tips for Choosing an EIAM for SMBs
How do SMBs choose the right enterprise IAM? Discover 11 expert tips for finding the right EIAM for SMEs and ...
The Future of SSH? Combining opkssh and cidaas for seamless Security
Secure and scalable SSH access: With opkssh & cidaas, identity-based access to infrastructure is secure, automated, and Zero Trust-compliant ...


